Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Information and System Security - Essay Example

Comments (0) Cite this document
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Information and System Security
Read TextPreview

Extract of sample "Information and System Security"

Information and System Security Information security means protecting information and information systems from un ized access, use, disclosure,disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.
The field of information security has grown and evolved significantly in recent years. As a career choice there are many ways of gaining entry into the field. It offers many areas for specialization including Information Systems Auditing, Business Continuity Planning. Information security is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption. The never ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review.
In recent years identity management has become increasingly important, especially in the financial services, healthcare and government industries. Why identity management has emerged as a growing business and IT priority is no mystery. Obvious drivers include the need to protect one's intellectual property, data brand value and customer loyalty from the potential damage wrought by electronically-based fraud and theft; the desire to cut technical support costs, increase productivity through self-service and enable integration across disparate platforms. Less obvious reasons, but equally important, include the challenges presented by changing environments, such as mergers, outsourcing, federated systems and global infrastructures, as well as industry and government regulations such as HIPAA, Sarbanes-Oxley and Gramm-Leach-Bliley acts.
The dictionary defines hackers as, "a talented amateur user of computers, specifically one who attempts to gain unauthorized access to files on various systems." (Webster's pg. 610) In other words, a hacker is a person who creates programs that infiltrate your PC and steal valuable information. It's hard to put a face on a criminal when he works miles away from you but is still just as effective as any other criminal. Thanks to Hollywood and the young group of kids that crowd the Internet; hackers have almost been made out to be artist-like. The movie "Hackers" make its characters seem like misunderstood geniuses looking to express themselves. The Internet community doesn't help debunk the idea when in chat rooms and message boards you'll find its contributors immortalizing them.
Hackers do more than just create programs to steal files. "Many notorious hacks were not feats of programming, but masterful psychological ploys" (TLC, 2006). Hackers play on people's fear of viruses to cause damage to their PC's. Hacker hoaxes can be just as bad as getting a virus. For example, an email in 2002 was sent out warning people about a virus that may be on their computer (TLC, 2002). The email instructed them to delete a certain file on their hard drive because of it's virus but the file was actual vital to running Windows and deleting the file would make Windows crash.
Internet security should be a high priority on every person's list that owns a computer. It makes sense since the majority of PC owners use their computer to hold valuable information, rely on it for their work, and count on it as a tool for every day life. An attack could potentially destroy your computer and all the information saved within it.
Even worse, that information could possibly be used by someone else just like a thief would steal your belongings from your home to sell. Prevention has come along way in addressing the issue of hackers but everyday hackers are coming up with new way to attack your PC. The Internet is a great thing. It's not perfect but even its imperfections shouldn't deter your desire to explore the vast wealth of information that makes up the Internet. Being aware of risks and taking steps to protect yourself will ensure that you can explore the Internet without fear.
Anti-Phishing Work Group. (2006). Retrieved April 21, 2006, from
Best Buy. (2006). Guide to Firewall Technology. Retrieved March 11, 2006 from
Best Buy. (2006). Internet Security and Monitoring. Retrieved March 11, 2006 from type=category&id=
Cybercrime. (2003). I Love You Virus. Retrieved April 21, 2006 from (2006). Top Ten Spyware- Killers. Retrieved March 1, 2006 from 2023_4-5157375.html
IBM. (2000). Virus Timeline. Retrieved April 21, 2006 from
Jerry Honeycutt. (2004). How To Protect Your Computer from Spyware and Adware.
Retrieved March 6,2006 from spyware.mspx.
L-Soft. (1999). LISTSERV. Retrieved April 21, 2006 from
Linux Kernel Archives. (1996). Orange Book Preamble. Retrieved April 21, 2006 from
Neufeldt, V (1991). Webster's New World Dictionary. New York, NY: Webster's.
Newsfactor Magazine. (2006). Why Can't Hackers Be Stopped. Retrieved April 21, 2006 from
Now Know How. (2004). Hackers. Retrieved April 21, 2006 from
PBS. (2001). A Hacker's Tools of the Trade. Retrieved April 21, 2006 from
Symantec. (2006). Security Advisories. Retrieved April 21, 2006 from
TLC. (2006). Hackers: Outlaws and Angels. Retrieved April 21, 2006 from
Wikipedia - The Free Encyclopedia. (2006). Phishing. Retrieved April 21, 2006, from Read More
Cite this document
  • APA
  • MLA
(“Information and System Security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from
(Information and System Security Essay Example | Topics and Well Written Essays - 500 Words)
“Information and System Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information and System Security

Evaluation Of Business Information System Security Policies: Case Study Of Government Departments

...? CCM2426: Individual Project Proposal ID Project Evaluation Of Business Information System Security Policies: Case Study Of Government Departments Table of Contents Table of Contents 1 Problem Definition 2 Global aim 3 Objectives Plans and Controls 4 Evidence of Requirement 5 General Context Description 7 Proposed Research Methodology 8 Product description 10 Deliverables 10 Testing the Outcome 11 Resources 11 Project Plan 12 Work Breakdown structure 12 Milestones 12 Project Time Schedule 12 References 13 Key words: Business Information System, Security Policies, Government Departments Problem Definition Beaver (2008) says that the security of business information must be given the highest priority by government departments irrespective...
12 Pages(3000 words)Coursework

Information security management system in business organisations in Saudi Arabia

...?Research Proposal: Information security management system in business organizations in Saudi Arabia Information is considered to be an important asset for any business organization in the modern competitive world. Along with the advancement and benefits of technology, new methods and techniques also prevail that threaten the confidentiality, availability and integrity of data. Incompetent business processes and operations also threaten the intellectual assets of the organization. It is due to these reasons that the information security management systems have become vital for organizations. Saudi Arabia is considered to be in the initial phases of the integration of technology in their business organizations. The paper will evaluate...
6 Pages(1500 words)Thesis Proposal

Information Security

...Information Security: Balance and Management Introduction Determining an appropriate level of information security is often complicated by the factthat different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities. Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context. The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than...
4 Pages(1000 words)Essay

Information System Security

Computer systems thus have to be constantly available, secure and accurate. To ensure this, adequate and effective risk management practices must be in place – that is, risk management must be effectively integrated into an organization’s existing security model, having readily available solutions for security threats and being ever vigilant for novel security threats as they develop.
The purpose of this study is to identify the role of risk management as part of the security model of modern information systems. To address this objective, the researcher primarily undertook a comprehensive review of related literature. The gained knowledge is then applied to a case study to illustrate the potential value of the area un...
56 Pages(14000 words)Essay

Accounting Information System: Security, Privacy and Other AIS Issues

...Table of Contents Overview of Accounting Information System 2 Risk Analysis in AIS: 3 Security Issues in AIS: 4 Disaster Recovery: 6 Data recovery strategies 7 HIPPA: 8 Impact of new technologies on AIS: 9 Real Time Vs. Batch wise data processing in AIS: 10 EDI 11 XBRL: 13 Summary: 14 Overview of Accounting Information System Accounting information systems are a vital part of an organization’s day-to-day operations. Every transaction has to be recorded in order to produce financial statements or any type of informal report that management may want to use for analysis. For this reason, accountants were some of the first people to need information systems. The advent of computer technology and the prevalence of e-business...
13 Pages(3250 words)Essay

Research method information system security management

...1. Tena and ity were the two ways responsible for the belief that prayers works. Tena is the way that still works today among believers. On the other hand, if we suppose that the whole world consists of energy or information (which has been proved by the scientists already), and prayers, therefore, may be the way of evolving some kind of energy and communicating it to the object of prayers, then the correlation between prayers and longevity may exist. In this case we use rationalism. However, we cannot measure this influence empirically for a number of reasons, as well as cannot envisage all the variables connected with the human life. Thus, the hypothesis made by Galton was positive, logical, and even refutable, but not strictly...
2 Pages(500 words)Essay

Information System Security of a Company

As companies increasingly focus on making changes to their security policies and enhancing security of their electronic resources and networks by using latest technologies, there is often a ‘weak link’ that they completely ignore. Kevin D. Mitnick, cofounder of Defensive Thinking (a Los Angeles-based information security firm) and a notorious former hacker, describes the measures companies should take against ‘social engineers’.
According to the author, phones are the most dangerous tools that hackers use in stealing out information from an organization. Because of their skills in deceiving naïve people into revealing proprietary information, these hackers are termed as social engineers. They attempt to gain information by en...
2 Pages(500 words)Essay

Auditing Information System: Security Management and Control

...Auditing Information System of Affiliation Auditing Information System This paper explores the studied of the first chapters in the course of Auditing Information System at Nova Southeastern University, these chapters are based on management security system, internal control, security and control assessment. The answers for this assignment are based on the material covered in the class and the research conducted on online (Internet) and offline (non-Internet). Keywords: accurate, authorization, changes, computer, development, program, security, system Assignment 1 Chapter 1 -Problem 5, Page 30 A. The purpose of each of the four controls, are as follow: 1- Authorization of transactions: this control is required to satisfactorily...
6 Pages(1500 words)Assignment

Information system security

...Information System Security Table of Contents 3 Introduction 4 Discussion 5 Certification Standards of the Information Security System 6 Framework and Assumptions for Creation of Information Security System 6 Necessity of Information Security System 9 Information System Security from a Management Perspective 10 Security Issues Associated with Management of an Information System Security and the Appropriate Risk Management 11 Cryptographic Concepts Associated with the Information System Security 13 Information System Security Breach 15 Conclusion 19 References 20 Abstract Advancement in the information technology (IT) has undoubtedly yielded significant benefits to individuals, business and government. However, dazzling growth in IT has...
12 Pages(3000 words)Research Paper

Project 3 Information System Security Plans

...Information System Security Plan An Assignment Submitted by Fall Information System SecurityPlan A nation can protect itself from threats and reach the top echelons only if its security system is made optimal and effective without any chance of loopholes. This is where the role of a security plan assumes significance. A foolproof security plan for the nation’s federal agencies and other governmental organizations can enable it to function securely and efficiently thereby giving the nation an ‘edge’ over other nations. That is, once agencies’ security structures and critical information are secured, they can operate without any threats, which in way strengthen the overall defense of the nation, weaken the defense of its enemies, and even...
5 Pages(1250 words)Research Paper

The Relationship Between Security, Risk and Health in a Large Organisation

Managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and resources (employees, funds, technology) available. The current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational environment. The measures required and the role of the security ma...
9 Pages(2250 words)Coursework

Microprocessor System and Application

In a computer, a processor commonly involves one or more microprocessors (also acknowledged as chips), which are silvers of silicon or other substance stamped with many little electronic circuits. To perform operations on data, the computer passes electricity all the way through circuits to execute an instruction (Norton 2001.p. 5). The innovation in technology has brought a lot of facilities for us. We have better ways of life and all the facilities regarding better production and domestic tasks. Such as in the industrial production we have automatic robots that are welding, packing, moving and carrying out several other development-related tasks. These robots are pre-programmed and microprocessors based chips are controlling all...
6 Pages(1500 words)Assignment

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Structure of the Educational System in Morocco and Its Capacity for Addressing the Needs of the Hospitality Industry

... insights (Ministry of Tourism, Government of Morocco, 2009, “Key Figures” and “Observatory of Tourism”). It is important to understand that publications related to a detailed analysis of the quality and capacity of the education system in Morocco to cater for the requirements of the 2010 Vision for the country are scarce. Thus, it was necessary to use lateral thinking and comparisons to gain insights about the challenge for workforce training and development for the hospitality and tourism sector in Morocco. However, detailed information about the education system in Morocco is available, together with publications about skills requirements for hospitality and tourism occupations, capacity building for education and quality enhancement...
15 Pages(3750 words)Research Proposal

Role of the Police and Private Security

... terrorism. Hence understanding the criminal justice system is extremely important so that it may be implemented effectively and impartially. Hence, this report will also cover the following areas namely, the three levels of law enforcement in United States, the interaction between those agencies, the role of the police and private security personnel in homeland security, the role of this group in intelligence gathering and federal funding. Three levels of law enforcement: The three levels of law enforcement in the United States cover national, state and local security. This task of homeland security is the responsibility of the Federal Bureau of Investigation (FBI), the state police forces, and the local police force. Each of them has...
8 Pages(2000 words)Case Study

Business Information Systems

.... This organizational management of Club IT project will provide a better system management and handing. The implementation of new management system will provide: Better organizational management Better information handling Centralized information retrial Identical data format Better online information access Enhanced data security Establishment of Quality of Services (QoS) Gaining better competitive edge Performance enhancement Better inter-departmental communication Enhanced customer management Fast order processing Assessment of Needs In this high competition and complex business management world Club IT requires extensive assistance from the powerful business management systems. These business management systems and enterprise...
8 Pages(2000 words)Case Study

Examination of the Thyroid System

In 2006, his gallbladder was removed. He takes over-the-counter anti-histamines, as needed for allergic rhinitis symptoms.
Personal and Social History: Mr. "S" is a 73-year-old widower who usually eats the organic food produced from the animals and the fruits and vegetables on his farm. He has two to three beers in the evening after dinner every night. He weighs 235 lbs and measures 5 10" tall.

Whether there is any family history of swelling in the limbs? Is the swelling present anywhere else other than the lower leg? What precipitates the shortness of breath and how long does it last? Is the shortness of breath severe? How long does he need to rest to overcome the shortness of breath? Does he feel dizzy when his b...
9 Pages(2250 words)Case Study

Economic Models: The Free Market and The State Owned System

The free market concept is mainly a theoretical concept as every country, even capitalist ones place some restrictions on the ownership and exchange of commodities (Free market economy). Therefore, the term free-market economy primarily means a system where the buyers and sellers are solely responsible for the choices they make. It gives the buyers and sellers the power to do business without being afraid of any regulations and intervention by the state. Hence, a free market gives the absolute power to prices to determine the allocation and distribution of goods and services (Free Market Economy). The pricing mechanism is in turn, driven by the forces of demand and supply of goods and services. Demand and supply of...
9 Pages(2250 words)Case Study

Global Employee Information and Consultation: Replicating the European Model

A significant step to enhancing the employees’ right to information and consultation is the establishment of the European Works Council (EWC). The EWC Directive (94/45/EC) aims to improve cooperation in transnational companies and to allow trade unions to influence, at least indirectly, the decision-making of corporations (Lockwood and Williams). It requires community-scale undertakings and community-scale groups of undertaking to create this mechanism for regular consultation of the workforce. A ‘community-scale undertaking’ is one with at least 1,000 employees within the Member States and at least 150 employees in each of at least two Member States (Lewis and Sargeant).

An EWC is a forum that would a...
9 Pages(2250 words)Coursework

Logistics System Management

The logistics system is designed in such a manner as the combination of various facilities in the transportation at home, and the operations involved in the warehouse and the distribution channels for the manufacturing are the same. The supply chain is a collection of various complicated systems of logistics where they have a collection of raw materials and goods that are useful for the manufacturing of the final product and to the final distributors. “For example, in make-to-assembly (MTA) systems components and semi-finished products are manufactured in a push-based manner while the final assembly stage is pull-based. Hence, the work-in-process inventory at the end of the first stage is used to assemble the finished produc...
15 Pages(3750 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Information and System Security for FREE!

Contact Us